Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. "A software engineer’s earnest effort to steer his new DJI robot vacuum with a video game controller inadvertently granted him a sneak peak into thousands of people’s homes.

"A software engineer’s earnest effort to steer his new DJI robot vacuum with a video game controller inadvertently granted him a sneak peak into thousands of people’s homes.

Scheduled Pinned Locked Moved Uncategorized
iotcybersecuritydjiirobotvaccum
8 Posts 8 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Miguel Afonso CaetanoR This user is from outside of this forum
    Miguel Afonso CaetanoR This user is from outside of this forum
    Miguel Afonso Caetano
    wrote last edited by
    #1

    "A software engineer’s earnest effort to steer his new DJI robot vacuum with a video game controller inadvertently granted him a sneak peak into thousands of people’s homes.

    While building his own remote-control app, Sammy Azdoufal reportedly used an AI coding assistant to help reverse-engineer how the robot communicated with DJI’s remote cloud servers. But he soon discovered that the same credentials that allowed him to see and control his own device also provided access to live camera feeds, microphone audio, maps, and status data from nearly 7,000 other vacuums across 24 countries. The backend security bug effectively exposed an army of internet-connected robots that, in the wrong hands, could have turned into surveillance tools, all without their owners ever knowing.

    Luckily, Azdoufal chose not to exploit that. Instead, he shared his findings with The Verge, which quickly contacted DJI to report the flaw. While DJI tells Popular Science the issue has been “resolved,” the dramatic episode underscores warnings from cybersecurity experts who have long-warned that internet-connected robots and other smart home devices present attractive targets for hackers."

    https://www.popsci.com/technology/robot-vacuum-army/

    #AI #IoT #CyberSecurity #DJII #RobotVaccum

    John BreenJ rayR WelkinW Pauline von HellermannP notsoloudN 7 Replies Last reply
    0
    • Miguel Afonso CaetanoR Miguel Afonso Caetano

      "A software engineer’s earnest effort to steer his new DJI robot vacuum with a video game controller inadvertently granted him a sneak peak into thousands of people’s homes.

      While building his own remote-control app, Sammy Azdoufal reportedly used an AI coding assistant to help reverse-engineer how the robot communicated with DJI’s remote cloud servers. But he soon discovered that the same credentials that allowed him to see and control his own device also provided access to live camera feeds, microphone audio, maps, and status data from nearly 7,000 other vacuums across 24 countries. The backend security bug effectively exposed an army of internet-connected robots that, in the wrong hands, could have turned into surveillance tools, all without their owners ever knowing.

      Luckily, Azdoufal chose not to exploit that. Instead, he shared his findings with The Verge, which quickly contacted DJI to report the flaw. While DJI tells Popular Science the issue has been “resolved,” the dramatic episode underscores warnings from cybersecurity experts who have long-warned that internet-connected robots and other smart home devices present attractive targets for hackers."

      https://www.popsci.com/technology/robot-vacuum-army/

      #AI #IoT #CyberSecurity #DJII #RobotVaccum

      John BreenJ This user is from outside of this forum
      John BreenJ This user is from outside of this forum
      John Breen
      wrote last edited by
      #2

      @remixtures I also wonder if a DJI engineer ever asked an "AI coding assistant" to help them code, thereby uploading all DJI's prorpietary software to an LLM model, so anyone can now write code like DJI would write, access proprietary code that way.

      1 Reply Last reply
      0
      • Miguel Afonso CaetanoR Miguel Afonso Caetano

        "A software engineer’s earnest effort to steer his new DJI robot vacuum with a video game controller inadvertently granted him a sneak peak into thousands of people’s homes.

        While building his own remote-control app, Sammy Azdoufal reportedly used an AI coding assistant to help reverse-engineer how the robot communicated with DJI’s remote cloud servers. But he soon discovered that the same credentials that allowed him to see and control his own device also provided access to live camera feeds, microphone audio, maps, and status data from nearly 7,000 other vacuums across 24 countries. The backend security bug effectively exposed an army of internet-connected robots that, in the wrong hands, could have turned into surveillance tools, all without their owners ever knowing.

        Luckily, Azdoufal chose not to exploit that. Instead, he shared his findings with The Verge, which quickly contacted DJI to report the flaw. While DJI tells Popular Science the issue has been “resolved,” the dramatic episode underscores warnings from cybersecurity experts who have long-warned that internet-connected robots and other smart home devices present attractive targets for hackers."

        https://www.popsci.com/technology/robot-vacuum-army/

        #AI #IoT #CyberSecurity #DJII #RobotVaccum

        rayR This user is from outside of this forum
        rayR This user is from outside of this forum
        ray
        wrote last edited by
        #3

        @remixtures
        Never been a fan of IoT.

        1 Reply Last reply
        0
        • Miguel Afonso CaetanoR Miguel Afonso Caetano

          "A software engineer’s earnest effort to steer his new DJI robot vacuum with a video game controller inadvertently granted him a sneak peak into thousands of people’s homes.

          While building his own remote-control app, Sammy Azdoufal reportedly used an AI coding assistant to help reverse-engineer how the robot communicated with DJI’s remote cloud servers. But he soon discovered that the same credentials that allowed him to see and control his own device also provided access to live camera feeds, microphone audio, maps, and status data from nearly 7,000 other vacuums across 24 countries. The backend security bug effectively exposed an army of internet-connected robots that, in the wrong hands, could have turned into surveillance tools, all without their owners ever knowing.

          Luckily, Azdoufal chose not to exploit that. Instead, he shared his findings with The Verge, which quickly contacted DJI to report the flaw. While DJI tells Popular Science the issue has been “resolved,” the dramatic episode underscores warnings from cybersecurity experts who have long-warned that internet-connected robots and other smart home devices present attractive targets for hackers."

          https://www.popsci.com/technology/robot-vacuum-army/

          #AI #IoT #CyberSecurity #DJII #RobotVaccum

          WelkinW This user is from outside of this forum
          WelkinW This user is from outside of this forum
          Welkin
          wrote last edited by
          #4

          @remixtures What makes you think that it was not already discovered and exploited? Or Worse it was a deliberate design decision?

          1 Reply Last reply
          0
          • Miguel Afonso CaetanoR Miguel Afonso Caetano

            "A software engineer’s earnest effort to steer his new DJI robot vacuum with a video game controller inadvertently granted him a sneak peak into thousands of people’s homes.

            While building his own remote-control app, Sammy Azdoufal reportedly used an AI coding assistant to help reverse-engineer how the robot communicated with DJI’s remote cloud servers. But he soon discovered that the same credentials that allowed him to see and control his own device also provided access to live camera feeds, microphone audio, maps, and status data from nearly 7,000 other vacuums across 24 countries. The backend security bug effectively exposed an army of internet-connected robots that, in the wrong hands, could have turned into surveillance tools, all without their owners ever knowing.

            Luckily, Azdoufal chose not to exploit that. Instead, he shared his findings with The Verge, which quickly contacted DJI to report the flaw. While DJI tells Popular Science the issue has been “resolved,” the dramatic episode underscores warnings from cybersecurity experts who have long-warned that internet-connected robots and other smart home devices present attractive targets for hackers."

            https://www.popsci.com/technology/robot-vacuum-army/

            #AI #IoT #CyberSecurity #DJII #RobotVaccum

            Pauline von HellermannP This user is from outside of this forum
            Pauline von HellermannP This user is from outside of this forum
            Pauline von Hellermann
            wrote last edited by
            #5

            @remixtures Wow, that’s really good to know. Also: scarily similar to the Wallace and Gromit film “Vengeance Most Fowl”!

            https://en.wikipedia.org/wiki/Wallace_%26_Gromit:_Vengeance_Most_Fowl

            1 Reply Last reply
            0
            • Miguel Afonso CaetanoR Miguel Afonso Caetano

              "A software engineer’s earnest effort to steer his new DJI robot vacuum with a video game controller inadvertently granted him a sneak peak into thousands of people’s homes.

              While building his own remote-control app, Sammy Azdoufal reportedly used an AI coding assistant to help reverse-engineer how the robot communicated with DJI’s remote cloud servers. But he soon discovered that the same credentials that allowed him to see and control his own device also provided access to live camera feeds, microphone audio, maps, and status data from nearly 7,000 other vacuums across 24 countries. The backend security bug effectively exposed an army of internet-connected robots that, in the wrong hands, could have turned into surveillance tools, all without their owners ever knowing.

              Luckily, Azdoufal chose not to exploit that. Instead, he shared his findings with The Verge, which quickly contacted DJI to report the flaw. While DJI tells Popular Science the issue has been “resolved,” the dramatic episode underscores warnings from cybersecurity experts who have long-warned that internet-connected robots and other smart home devices present attractive targets for hackers."

              https://www.popsci.com/technology/robot-vacuum-army/

              #AI #IoT #CyberSecurity #DJII #RobotVaccum

              notsoloudN This user is from outside of this forum
              notsoloudN This user is from outside of this forum
              notsoloud
              wrote last edited by
              #6

              @remixtures
              The question here is not why he had access.

              The question is why DJI does.

              1 Reply Last reply
              0
              • Miguel Afonso CaetanoR Miguel Afonso Caetano

                "A software engineer’s earnest effort to steer his new DJI robot vacuum with a video game controller inadvertently granted him a sneak peak into thousands of people’s homes.

                While building his own remote-control app, Sammy Azdoufal reportedly used an AI coding assistant to help reverse-engineer how the robot communicated with DJI’s remote cloud servers. But he soon discovered that the same credentials that allowed him to see and control his own device also provided access to live camera feeds, microphone audio, maps, and status data from nearly 7,000 other vacuums across 24 countries. The backend security bug effectively exposed an army of internet-connected robots that, in the wrong hands, could have turned into surveillance tools, all without their owners ever knowing.

                Luckily, Azdoufal chose not to exploit that. Instead, he shared his findings with The Verge, which quickly contacted DJI to report the flaw. While DJI tells Popular Science the issue has been “resolved,” the dramatic episode underscores warnings from cybersecurity experts who have long-warned that internet-connected robots and other smart home devices present attractive targets for hackers."

                https://www.popsci.com/technology/robot-vacuum-army/

                #AI #IoT #CyberSecurity #DJII #RobotVaccum

                Chao-c'X This user is from outside of this forum
                Chao-c'X This user is from outside of this forum
                Chao-c'
                wrote last edited by
                #7

                @remixtures All hail our new Roomba overlords!

                1 Reply Last reply
                0
                • Miguel Afonso CaetanoR Miguel Afonso Caetano

                  "A software engineer’s earnest effort to steer his new DJI robot vacuum with a video game controller inadvertently granted him a sneak peak into thousands of people’s homes.

                  While building his own remote-control app, Sammy Azdoufal reportedly used an AI coding assistant to help reverse-engineer how the robot communicated with DJI’s remote cloud servers. But he soon discovered that the same credentials that allowed him to see and control his own device also provided access to live camera feeds, microphone audio, maps, and status data from nearly 7,000 other vacuums across 24 countries. The backend security bug effectively exposed an army of internet-connected robots that, in the wrong hands, could have turned into surveillance tools, all without their owners ever knowing.

                  Luckily, Azdoufal chose not to exploit that. Instead, he shared his findings with The Verge, which quickly contacted DJI to report the flaw. While DJI tells Popular Science the issue has been “resolved,” the dramatic episode underscores warnings from cybersecurity experts who have long-warned that internet-connected robots and other smart home devices present attractive targets for hackers."

                  https://www.popsci.com/technology/robot-vacuum-army/

                  #AI #IoT #CyberSecurity #DJII #RobotVaccum

                  MarianneN This user is from outside of this forum
                  MarianneN This user is from outside of this forum
                  Marianne
                  wrote last edited by
                  #8

                  @remixtures stealth mountain strikes again (I checked the article wrote 'sneak peak' and yep)

                  1 Reply Last reply
                  0
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Don't have an account? Register

                  • Login or register to search.
                  Powered by NodeBB Contributors
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups